Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
104948 Total Search   |   Showing Results : 1061 - 1080
CVE-2013-0096 This security update resolves a vulnerability in Windows Essentials. The vulnerability could allow information disclosure if a user opens Windows Writer using a maliciously crafted URL.
CVE-2013-1278,CVE-2013-1279,CVE-2013-1280 This patch addresses vulnerabilities in Microsoft Windows, which can allow elevation of privilege once an attacker logs and runs a specially crafted
following copies of itself into the affected system: %Application Data%\MsDtc\dwmc.exe (Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}
CVE-2007-6204 HP OpenView Network Node Manager is prone to multiple stack-based buffer-overflow vulnerabilities. Successfully exploiting these issues allows remote attackers to execute arbitrary code
CVE-2007-5339 Multiple vulnerabilities in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via
unpatched systems. It exploits a known vulnerability in Internet Explorer versions 5.01 and 5.5. known as the Automatic Execution of Embedded MIME Type . This vulnerability causes Internet Explorer to
5.0.23/5.1.31 - Remote Code Execution D-Link Devices - HNAP SOAPAction-Header Command Execution D-Link DSL-2750B - OS Command Injection Huawei Router HG532 - Arbitrary Command Execution GPON Routers -
CVE-2011-1968 This security update resolves a privately reported vulnerability in the Remote Desktop Protocol (RDP) . The vulnerability could allow denial of service if an affected system received a
CVE-2006-6184 Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary
CVE-2014-1761 Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, 2013 RT and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via
Windows folder, which is usually C:\Windows or C:\WINNT.) It exploits the following software vulnerabilities to propagate to other computers across a network: Vulnerability in Server Service Could Allow
CVE-2008-1276 Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute
Execution Vulnerability (CVE-2021-34473 and CVE-2022-41040) 1011548* - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2022-41082) 1011519* - Node.js HTTP Request Smuggling Attack
This security update addresses the vulnerability found in Microsoft Windows. Once successfully exploited, it could allow a remote attacker from retrieving passwords stored with Group Policy
CVE-2006-4777 Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other
software vulnerabilities to allow a remote user or malware/grayware to download files. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected
* - Microsoft Windows Jet Database Engine Multiple Remote Code Execution Vulnerabilities (May-2019) 1010004 - Oracle Java ActiveX Plugin Uninitialized Window Handle Remote Code Execution Vulnerability
malicious sites. Download Routine This Trojan accesses the following websites to download files: http://{BLOCKED}oup.com/file.exe It takes advantage of the following software vulnerabilities to allow a remote
malicious sites. Download Routine This Trojan accesses the following websites to download files: http://{BLOCKED}oup.com/file.exe It takes advantage of the following software vulnerabilities to allow a remote
CVE-2007-1204 Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in Microsoft Windows XP SP2 allows remote attackers on the same subnet to execute arbitrary code via crafted